Security

Security news, trends, analysis and practical advice

atm cash machine money
Easy Everyday Encryption

Digital Key, security, encryption

New JavaScript spam wave distributes Locky ransomware

Over the past week, computers throughout Europe have been hit by a massive email spam campaign carrying malicious JavaScript attachments that install the Locky ransomware program.

Bilbao Microsoft Facebook MAREA undersea cable

What is MAREA? Oh, just an epic shift that changes everything [updated]

Microsoft and Facebook will build MAREA, the fastest trans-Atlantic cable ever. But why is this HUGE news -- is it because of the cable itself, or because of how it'll be used?

atm cash machine money

Up to a dozen banks are reportedly investigating potential SWIFT breaches

Up to 12 banks have reportedly launched investigations into potential security breaches on their networks after hackers stole $81 million from the Bangladesh central bank earlier this year.

collage of US government icons

ACLU wants a piece of the Microsoft v. U.S. data gag order lawsuit

The ACLU wants a federal judge to let it join Microsoft in suing the U.S. government over the use of gag orders that prevent the technology firm from telling customers their data has been demanded

160412 facebook zuckerberg 2

'Black box' no more: This system can spot the bias in those algorithms

Between recent controversies over Facebook's Trending Topics feature and the U.S. legal system's "risk assessment" scores in dealing with criminal defendants, there's probably never been broader interest in the mysterious algorithms...

Facebook privacy (1)

Senators want warrant protections for U.S. email stored overseas

A new bill in Congress would require U.S. law enforcement agencies to obtain court-ordered warrants before demanding the emails of the country's residents when they are stored overseas.

Legislation of privacy security keyboard law legal gavel

Celebrity hacker Guccifer's confession gives us all a lesson in security

A Romanian hacker known online as Guccifer pleaded guilty to hacking into 100 email and social media accounts belonging to American citizens, including former high-ranking government officials.

20160511 iotworld buddy lego city

IoT security is getting its own crash tests

The thousands of endpoints in IoT systems may have to protect themselves against thousands of dangers. A decades-old IT lab wants to tell you if those systems are up to the task.

buried under documents

Are you buried under your security data?

I will confess upfront that I am skeptical about the whole idea of threat intelligence sharing. Companies may decline to share such information because they fear the loss of competitive advantage, or because they don't have the time...

Max Schrems at irish dpc

New court request raises further doubts about transatlantic data transfers

Thousands of companies were turned into lawbreakers at a stroke the last time the High Court of Ireland referred a question about data protection to the Court of Justice of the European Union. And it may be about to do it again.

Faception spot terrorist

Faception can allegedly tell if you're a terrorist just by analyzing your face

Faception claims it can spot if you are a terrorist, pedophile, genius or some other personality – judging a book by its cover with an 80% accuracy, by just analyzing your face. An unnamed homeland security inked a contract with the...

Data analytics, big data, business, chart, laptop

Top-level domain expansion is a security risk for business computers

The explosion of new generic top-level domains (gTLDs) in recent years can put enterprise computers at risk due to name conflicts between domain names used inside corporate networks and domains that can now be registered on the public...

apple campus headquarters stock

Apple hires mobile encryption pioneer amid encryption debate

Apple revealed that it rehired a mobile encryption pioneer as the company continues to face scrutiny from governments wanting more access to its products.

malware

Do we need vendor allies in the malware arms race?

The complexity of today’s SOC functions means you probably can’t hire and keep a staff with all the necessary training.

cyberattack

State officials worry about their ability to fight cyberattacks

Many U.S. states aren't confident in their ability to respond to cyberattacks on physical infrastructure such as water and electric systems, some emergency response officials said.

Digital Key, security, encryption

New DMA Locker ransomware is ramping up for widespread attacks

A new ransomware program called DMA Locker has reached maturity and shows signs of being distributed in widespread attacks.

MacBook Pro 2016 Apple

'Delayed' MacBook Pro 2016 to be thinner (says bored analyst)

The MacBook Pro 2016 line will be thinner and lighter. Shocking, I know -- but they'll also have Touch ID and a bunch of OLED soft keys, atop the keyboard...

virtual data wave pattern

How data virtualization delivers on the DevOps promise

Your data could be standing in the way of getting the most out of DevOps and continuous delivery. It’s also a significant security risk in development -- and that’s about to get more expensive.

Load More